An efficient certificateless signature scheme M Gorantla, A Saxena Computational Intelligence and Security, 110-116, 2005 | 211 | 2005 |
Modeling key compromise impersonation attacks on group key exchange protocols MC Gorantla, C Boyd, JMG Nieto, M Manulis ACM Transactions on Information and System Security (TISSEC) 14 (4), 1-24, 2008 | 80 | 2008 |
Attribute-based authenticated key exchange MC Gorantla, C Boyd, JM González Nieto Information Security and Privacy: 15th Australasian Conference, ACISP 2010 …, 2010 | 68 | 2010 |
A survey on id-based cryptographic primitives MC Gorantla, R Gangishetti, A Saxena Cryptology ePrint Archive, 2005 | 57 | 2005 |
ID-based One-pass Authenticated Key Establishment. MC Gorantla, C Boyd, JMG Nieto AISC 8, 39-46, 2008 | 44 | 2008 |
An efficient secure key issuing protocol in ID-based cryptosystems R Gangishetti, MC Gorantla, ML Das, A Saxena, VP Gulati International Conference on Information Technology: Coding and Computing …, 2005 | 39 | 2005 |
Generic one round group key exchange in the standard model MC Gorantla, C Boyd, JM González Nieto, M Manulis Information, Security and Cryptology–ICISC 2009: 12th International …, 2010 | 37 | 2010 |
Threshold key issuing in identity-based cryptosystems R Gangishetti, MC Gorantla, ML Das, A Saxena Computer Standards & Interfaces 29 (2), 260-264, 2007 | 37 | 2007 |
Verifiably encrypted signature scheme without random oracles MC Gorantla, A Saxena Distributed Computing and Internet Technology: Second International …, 2005 | 35 | 2005 |
On the connection between signcryption and one-pass key establishment MC Gorantla, C Boyd, JM González Nieto Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007 | 27 | 2007 |
Identity based multisignatures R Gangishetti, MC Gorantla, ML Das, A Saxena Informatica 17 (2), 177-186, 2006 | 24 | 2006 |
Stronger security model of group key agreement J Zhao, D Gu, MC Gorantla Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 23 | 2011 |
Universally composable contributory group key exchange MC Gorantla, C Boyd, JMG Nieto Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 17 | 2009 |
System and method to anonymize data transmitted to a destination computing device P Kothari, M Gorantla US Patent 9,432,342, 2016 | 16 | 2016 |
System and method to anonymize data transmitted to a destination computing device P Kothari, D Dash, M Gorantla US Patent 9,413,526, 2016 | 15 | 2016 |
An effective certificateless signature scheme based on bilinear pairings M Gorantla, R Gangishetti, M Das, A Saxena Proc. 3rd Int. Workshop on Security in Information Systems, 31-39, 2005 | 11 | 2005 |
One round group key exchange with forward security in the standard model MC Gorantla, C Boyd, JMG Nieto Cryptology ePrint Archive, 2010 | 9 | 2010 |
Cryptanalysis of Key Issuing Protocols in ID-based Cryptosystems R Gangishetti, MC Gorantla, ML Das, A Saxena arXiv preprint cs/0506015, 2005 | 9 | 2005 |
System and method to anonymize data transmitted to a destination computing device P Kothari, M Gorantla US Patent 9,613,227, 2017 | 8 | 2017 |
Methods for format preserving and data masking and devices thereof A Saxena, MC Gorantla, RS Veerubhotla, S Gupta, I Jain US Patent App. 13/938,380, 2014 | 8 | 2014 |